CVE-2021-45085: XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list. CVE-2021-45086: XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js. CVE-2021-45087: XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title. CVE-2021-45088: XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page. Please stabilize 40.5.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e5cac5f9a9f48671d4c27f425952d7ac8bf7b5e3 commit e5cac5f9a9f48671d4c27f425952d7ac8bf7b5e3 Author: Mart Raudsepp <leio@gentoo.org> AuthorDate: 2021-12-17 17:50:36 +0000 Commit: Mart Raudsepp <leio@gentoo.org> CommitDate: 2021-12-17 17:50:36 +0000 www-client/epiphany: security cleanup Bug: https://bugs.gentoo.org/829380 Package-Manager: Portage-3.0.20, Repoman-3.0.2 Signed-off-by: Mart Raudsepp <leio@gentoo.org> www-client/epiphany/Manifest | 2 - www-client/epiphany/epiphany-40.2.ebuild | 86 -------------------------------- www-client/epiphany/epiphany-40.3.ebuild | 85 ------------------------------- 3 files changed, 173 deletions(-)
Thanks, all done!